Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explore (Open) VEX Statement Generation #43

Open
abhisek opened this issue Apr 5, 2023 · 0 comments
Open

Explore (Open) VEX Statement Generation #43

abhisek opened this issue Apr 5, 2023 · 0 comments
Labels
enhancement New feature or request research

Comments

@abhisek
Copy link
Member

abhisek commented Apr 5, 2023

What is VEX

Vulnerability Exploitability eXchange (VEX) is a form of a security advisory where the goal is to communicate the exploitability of components with known vulnerabilities in the context of the product in which they are used.

https://cyclonedx.org/capabilities/vex/

Why do we need VEX

Security scanners will detect and flag components in software that have been identified as being vulnerable. Often, software is not necessarily affected as signaled by security scanners for many reasons such as: the vulnerable component may have been already patched, may not be present, or may not be able to be executed. To turn off false alerts like these, a scanner may consume VEX data from the software supplier.

https://github.com/openvex/spec#about-vex

VEX in vet Context

vet is a tool intended to identify OSS dependencies and subsequently identify risks in such dependencies using configured policies. While generating SBOM is not an absolute requirement, vet can do that using its data model.

From a user's perspective, it may be useful to continuously generate SBOM using vet and maintain an inventory of SBOMs associated with each release of a software component. This may also be useful in audit use-cases, where an auditor persona uses vet to generate an SBOM for an application which in turn is used for risk assessment.

In this context, it may be very useful for such user persona to generate VEX statements to associate additional information with the vulnerabilities / risks identified by vet and included in SBOM. Particularly, vulnerabilities can be marked as fixed or not applicable as required.

User Experience

More thought and user survey is required to define this. But at a high level, it should be:

  1. Create an YAML document with issues to be marked as fixed / NA etc. with justifcation
  2. Ingest the YAML document during SBOM building phase to auto-generate VEX statements in SBOM

Reference

@abhisek abhisek added enhancement New feature or request research labels Apr 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request research
Projects
None yet
Development

No branches or pull requests

1 participant